Data driven investment advice

Enable next generation asset management using our services

CONTACT US

We provide fast and easy intergration through our APIs

Sample request to get a portfolio

# Get Alpha Portfolio
>>> import json, urllib2
>>> portfolio_type='alpha'
>>> req = urllib2.Request('http://api.qplum.co/v1/recommendation/portfolios?type=%s' %portfolio_type)
>>> req.add_header('Authorization', 'Bearer YOUR_ACCESS_KEY')
>>> r = urllib2.urlopen(req)
>>> print json.loads(r.read())
                            

Sample Response

[
  {
    'portfolio_id': 3100,
    'stats': {
      'ann_std': 13.06,
      'expected_return': 11.05,
      'expected_risk': 13.06,
      'max_yearly_loss': 23.65,
      'ann_turnover': 442.89
    },
    'type': 'alpha',
    'product_allocations': [
      {
        'allocation': 2.55,
        'sector': 'FixedIncome',
        'symbol': 'BIV',
        'display_name': 'Intermediate Term U.S. Govt. Bonds'
      },
      {
        'allocation': 8.11,
        'sector': 'FixedIncome',
        'symbol': 'BLV',
        'display_name': 'Long Term U.S. Bonds'
      },
      {
        'allocation': 0.36,
        'sector': 'FixedIncome',
        'symbol': 'BND',
        'display_name': 'Total U.S. Bonds'
      },
      {
        'allocation': 2.2,
        'sector': 'FixedIncome',
        'symbol': 'BNDX',
        'display_name': 'Total International Bonds'
      }
    ],
    'cash_allocation': 0.0
  }
]
                        


Our Services

Fast and easy integration through APIs.

Advisory

Bespoke portfolios based on financial planning and risk tolerance

Portfolio Management

Risk management, daily fractional rebalancing, tax loss harvesting

Execution

Multiple execution algorithms based on advanced data science

Secure

Encryption

All personally identifiable information we store is encrypted with symmetric key algorithms.

Trusted Custodians

Your account is with trusted custodians registered with the SEC and FINRA.

Regulated

Registered as an RIA with the SEC and as a CTA with the NFA.

Security Policies

Logging of all actions, periodic audits, restricted access